53,435
53K
software
eye 53,435
favorite 7
comment 3
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 3 reviews )
52,649
53K
software
eye 52,649
favorite 7
comment 9
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 9 reviews )
67,731
68K
software
eye 67,731
favorite 20
comment 5
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 5 reviews )
53,405
53K
software
eye 53,405
favorite 23
comment 7
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 7 reviews )
75,988
76K
software
eye 75,988
favorite 14
comment 4
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 4 reviews )
26,484
26K
software
eye 26,484
favorite 4
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
( 2 reviews )
37,465
37K
software
eye 37,465
favorite 10
comment 8
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 8 reviews )
63,829
64K
software
eye 63,829
favorite 12
comment 5
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 5 reviews )
22,624
23K
software
eye 22,624
favorite 7
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
14,939
15K
software
eye 14,939
favorite 1
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
18,455
18K
software
eye 18,455
favorite 6
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
9,082
9.1K
Feb 24, 2016
02/16
by
Daniel White
movies
eye 9,082
favorite 4
comment 4
A quick presentation on Virus History by Daniel White at Project Cyber Virus, held on May 5th, 2015 at Swissnex San Francisco. In 2004, Daniel White’s computer was infected with the Sasser worm, a fast-spreading autonomous worm that made millions of computers around the world reboot continuously. Fascinated by the concept of malware, he spent the following years learning everything he could about the subject, from general malware news to specific details of every virus, becoming a self-taught...
favoritefavoritefavoritefavoritefavorite ( 4 reviews )
Topics: Virus, History, Malware
12,465
12K
software
eye 12,465
favorite 2
comment 3
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 3 reviews )
4,558
4.6K
software
eye 4,558
favorite 1
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
( 1 reviews )
13,172
13K
software
eye 13,172
favorite 2
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
18,520
19K
software
eye 18,520
favorite 1
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
5,203
5.2K
software
eye 5,203
favorite 1
comment 1
Malware Example: PPSCARE.COM *PPSCARE.COM - upon invocation, PingPongScare (tm) will become resident and clutter the screen with the characteristic "bouncing ball" of the PingPong boot block infector. Computing can continue while PingPongScare is in effect.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
14,260
14K
software
eye 14,260
favorite 1
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
33,684
34K
software
eye 33,684
favorite 12
comment 6
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 6 reviews )
4,115
4.1K
software
eye 4,115
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
5,817
5.8K
software
eye 5,817
favorite 1
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
23,570
24K
software
eye 23,570
favorite 5
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
9,235
9.2K
software
eye 9,235
favorite 1
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
2,978
3.0K
software
eye 2,978
favorite 2
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
19,314
19K
software
eye 19,314
favorite 4
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 2 reviews )
4,428
4.4K
software
eye 4,428
favorite 2
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
7,557
7.6K
software
eye 7,557
favorite 2
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
9,287
9.3K
software
eye 9,287
favorite 3
comment 3
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 3 reviews )
5,298
5.3K
software
eye 5,298
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavorite ( 1 reviews )
8,347
8.3K
software
eye 8,347
favorite 4
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 2 reviews )
6,474
6.5K
software
eye 6,474
favorite 1
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
21,323
21K
Feb 5, 2016
02/16
by
Mikko Hypponen
movies
eye 21,323
favorite 21
comment 0
Presented at DEF CON 19 in Las Vegas, Nevada in 2011. "It's 2011, so this year it's going to be 25 years since Brain.A, the first PC virus, Join Mikko Hypponen as he talks about the history and evolution of computer viruses. From Brain to Stuxnet, he's spent his career tracking malware and will give a pretty good rundown on what has happened, when and why it mattered. Mikko Hypponen is based in Helsinki, Finland. He has been analysing computer viruses for more than 20 years. He has written...
14,271
14K
software
eye 14,271
favorite 1
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
12,924
13K
software
eye 12,924
favorite 2
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavorite ( 1 reviews )
5,672
5.7K
software
eye 5,672
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
( 1 reviews )
2,005
2.0K
Feb 11, 2016
02/16
by
Mikko Hyppönen
texts
eye 2,005
favorite 4
comment 0
This paper categorizes different types of virus activation routines which are found in existing viruses and also discusses what triggers these activation routines. Common viruses are used as examples where possible. This paper also covers why it is important to know what a virus exactly does if you are infected by one. Some horror stories of the worst possible activation routine in a virus are also included. The scope of this paper is limited to PC compatible machines.
Topics: virus, viruses, activation, routines, routine, antivirus, user, mosaic, hard, machine, activation...
16,368
16K
software
eye 16,368
favorite 1
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
4,760
4.8K
software
eye 4,760
favorite 1
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
5,897
5.9K
software
eye 5,897
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
5,533
5.5K
software
eye 5,533
favorite 1
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
7,630
7.6K
software
eye 7,630
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
7,648
7.6K
software
eye 7,648
favorite 3
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
11,401
11K
software
eye 11,401
favorite 2
comment 3
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 3 reviews )
12,476
12K
software
eye 12,476
favorite 0
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
7,228
7.2K
software
eye 7,228
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
10,330
10K
software
eye 10,330
favorite 1
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
4,359
4.4K
software
eye 4,359
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
17,657
18K
software
eye 17,657
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
2,555
2.6K
software
eye 2,555
favorite 1
comment 0
Malware Example: CASCARE.COM *CASCARE.COM - upon invocation, CascadeScare (tm) will become resident. After a brief pause, the characteristic rat-a-tat sound of the Cascade virus and its nifty falling letters effect will be seen. This will continue intermittently, for as long as CascadeScare is resident. If the computer is in graphics mode, only the rat-a-tat sound effect will be noticed.
1,400
1.4K
Feb 11, 2016
02/16
by
Mikko Hyppönen
texts
eye 1,400
favorite 3
comment 0
This paper will discuss methods viruses use or might use in the future to attack anti-virus programs. Attacks of this kind are becoming more common, as virus writers seem to be constantly looking for ways to make their viruses more efficient and vigorous. This paper also suggests how to make antivirus products more resistant against such attacks. The scope of this paper is limited to PC compatible machines
Topics: virus, program, viruses, attack, vims, scanner, programs, code, retrovirus, resident, virus...
3,969
4.0K
software
eye 3,969
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
85,113
85K
software
eye 85,113
favorite 3
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
5,811
5.8K
software
eye 5,811
favorite 1
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
2,896
2.9K
software
eye 2,896
favorite 1
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
4,987
5.0K
software
eye 4,987
favorite 3
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
4,692
4.7K
software
eye 4,692
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
( 1 reviews )
1,667
1.7K
software
eye 1,667
favorite 0
comment 0
Malware Example: DENSCARE.COM *DENSCARE.COM - upon invocation, DenZukoScare (tm) immediately displays the popular DEN ZUK virus graphic effect and exits.
4,497
4.5K
software
eye 4,497
favorite 1
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
2,994
3.0K
software
eye 2,994
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
2,917
2.9K
software
eye 2,917
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
4,317
4.3K
software
eye 4,317
favorite 1
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
3,574
3.6K
software
eye 3,574
favorite 1
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
6,795
6.8K
software
eye 6,795
favorite 3
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
2,668
2.7K
software
eye 2,668
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
3,205
3.2K
software
eye 3,205
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
3,230
3.2K
software
eye 3,230
favorite 1
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
2,951
3.0K
software
eye 2,951
favorite 3
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
3,516
3.5K
software
eye 3,516
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
3,531
3.5K
software
eye 3,531
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
4,095
4.1K
software
eye 4,095
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
3,159
3.2K
software
eye 3,159
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
11,674
12K
software
eye 11,674
favorite 2
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavorite ( 1 reviews )
2,637
2.6K
software
eye 2,637
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
2,832
2.8K
software
eye 2,832
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
2,967
3.0K
software
eye 2,967
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.